Course 2 - 205 - Protection of Critical Data & Privacy Flashcards

1
Q

Why is there such a critical need to protect our data? How has that need evolved? What can we expect moving forward?

A

Companies are currently spending millions to secure critical information, yet incidents of network intrusions that result in compromised data continue to rise. Business threats associated with inadequate security policies and practices are more significant than ever. The reality of these potential threats—whether as the result of accidental and situational exposures or deliberate attacks—can directly result in the interruption of business services and have a substantial impact on company profitability. These attacks may also result in data breaches that can expose private and confidential information, leading to devastating outcomes for customers, our employees, and our business. Building awareness and managing potential risks therefore becomes essential to the resilience of the organization.
When it comes to information systems, we must not only become proficient at using this data to serve the needs of our company and our customers, we must also become superior custodians of that information as well.
Every source of critical data must be secured and defended to maintain the trust, confidence, and conviction necessary to operate a successful organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the ultimate goal of Data Security?

A

The ultimate goal is still to protect the security, confidentiality, integrity, quality, and availability of a company’s information assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two most critical components of a strong security policy?

A

1) Corporate management supports the policy; and

2) The policy aligns information security with the core objectives of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some common subject areas typically found in an information security policy?

A

Employee/Management Roles and Responsibilities

Guidelines for Acceptable and Unacceptable Use of Company Resources (i.e. Internet and Email)

Acceptable Use of Company Software and Hardware

Non-Compliance Issues

Incident Management

Remote Access and Mobile Computing

Information Classification Guidelines

User ID and Password Standards and Management

Physical Security

Data Archiving (how often each user should copy information to an archive file) and Backup Requirements

A framework and foundation for governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the key principles of a sound data security plan?

A

First, take stock in what you have—know what information you have access to in your files and on your computer. Second, limit access to only the information you need. Limit exposures by managing accessibility (for example, store sensitive information on a company server or other secure location rather than your laptop), and properly secure or dispose of what you no longer need. Next, keep information in your care locked down and protected by controlling access to the “front door” by monitoring and restricting access to your equipment.

Finally, plan ahead. Have a plan to respond to security incidents if they occur. Knowing how to react and respond will help to limit exposures and minimize potential risks and damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some additional security tips that we should follow on a daily basis?

A

Keep operating systems updated as necessary and appropriate. The most recent version of any operating system is generally the safest. Protect systems by downloading the latest security updates to limit vulnerabilities.

Backup important data on a regular basis, and store it in a separate location to minimize risks of data loss. Any data that hasn’t been backed up is at risk. Audit data storage by periodically conducting trial restores to ensure the data is actually being backed up.

Install firewalls on computer systems. A firewall is a combination of software and/or hardware that provides a protective barrier between a computer or computer network and the public Internet. Essentially firewalls protect your online gateway and block unauthorized access to your computer or computer network.

Use anti-virus software on computers. A computer virus is a program designed to copy itself into other programs stored in a computer, infecting and potentially damaging the files that receive it. Some viruses are mild, while others are very destructive and can wipe out a computer’s memory or even cause more severe damage. Anti-virus software continuously scans your computer looking for viruses, and also checks incoming email and websites for potential threats. Updates must be performed regularly to stay current and effective.

Use spyware protection on computers. Spyware is computer software that is covertly used to gather personal information and monitor user activity and surfing habits, but can also have other potentially harmful consequences such as installing additional software, redirecting Web browser activity, accessing websites blindly, changing computer settings, slowing connection speeds, and otherwise damaging or interfering with user control. Spyware protection must also be updated regularly to remain effective.

Protect passwords! Weak password protocols are a common security flaw that can increase risks. Change passwords frequently and use a “strong” password that is difficult to guess or decipher. Use a combination of letters, numbers, and other characters. Do not share passwords with others, and resist saving passwords when prompted.

Do not open attachments in emails from people or sources you do not know. Filter out unwanted spam email using spam filter programs when possible. Don’t click on anything in a spam email, even to unsubscribe. If possible don’t even open it.

Take precautions when sending sensitive or proprietary information via email. Password protect documents when necessary.

Only allow staff access to the information needed to do their job. For example, as employees move within an organization, access privileges can follow and quickly mount. Ensuring employees only have access to information appropriate for their current position can be an essential step in avoiding manipulation and/or loss of data.

Do not use shared devices (for example, hotel computers) to access information that should be protected.

When possible, encrypt any personal information held electronically if it might cause damage or threat if lost or stolen. Encryption is the changing of data into code, a procedure that renders the content of a message or file unreadable to anyone not authorized to read it.

Audit data storage for security policy enforcement, access control, and proper destruction of appropriate content on a regular basis. Delete information that is no longer necessary, and disable unneeded functionality. Do not dispose of old computers until all pertinent information has been securely removed (by authorized technology or destroying the hard disk). Ensure that computers and other equipment are appropriately cleansed (of information, software, etc…) before it is allocated to another employee.

Always lock your computer when you are away from it. Log off and shut down your computer prior to leaving for the day.

Develop and implement appropriate security protocols regarding the use of removable storage devices (such as external hard drives, flash drives, etc.). Such devices can hold significant amounts of information, and should be carefully monitored and tightly controlled.

Know how to notify appropriate parties immediately in the event digital devices or assets (phones, laptops, confidential documents, etc.) are lost or stolen. Understand the appropriate policies and practices, and maintain access to an emergency contact number.

Recognize information security is not just about protecting the technology—it’s also about protecting physical assets, communications, access controls, and every aspect of our information networks. This would include the physical security of company premises, proper disposal of confidential paper waste, etc. It is also about ensuring that your staff is adequately trained and responsibilities clearly communicated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are some important questions that we should consider when constructing our data security systems?

A

What data is used and stored on the system?

Who uses or otherwise has access to the system?

How do users access the system?

What functions does the system provide, and what is the relative importance of those functions?

Are there other networks, programs or users that share the system? What is the potential connectivity to other networks and/or users?

Where is the system physically located?

How are data backups made, how frequently, and where are they stored? Who has access to them?

Are there any regulatory or statutory requirements that we have to consider?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Access Control?

A

Access control is the ability to monitor and regulate who has access to sensitive areas and/or information. Designed to restrict privileges based on an individual’s identity, access control is commonly applied to the retail world in terms of physical security, computer security, and network security systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the primary components of an access control system?

A

The primary component of any access control system is the development of criteria by which access levels to both areas and individuals are assigned. Role and policy-based controls enable the building of complex rules that govern various levels of accessibility to areas and/or information, ensuring security controls while providing adequate access and productivity to meet the various needs of the business. Simply stated, we want to design a system that is secure, but allows that the appropriate individuals have access to the areas they need to perform their jobs; and in a way that is not a hindrance to day-to-day activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In terms of computer security, what are the three essential services of access control?

A

i) Identification & Authentication
ii) Authorization
iii) Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is authentication? Name some examples of common authenticators…

A

This determines who can log on to a system. It is the process of verifying a user’s identity for the purposes of using the system, during which time an “authenticator” is established. Authenticators are typically based on at least one (but sometimes more than one) of the following factors:

Something you know, such as a password or personal identification number (PIN). This assumes only the owner of the account knows the password or PIN necessary to access the account.

Something you have, such as an access card or token. Once again, this assumes only the owner of the account has access to the card or token.

Something you are, which might involve fingerprint identification, voice recognition, retina scans, or other devices.

Where you are, for example whether inside or outside the company firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is authorization?

A

This determines what you can do once you are in the system. Most operating systems define permissions that are variations or extensions of three primary types of access:

Read information found in the file contents.

Write or modify the contents of a file by adding, creating, deleting, or renaming files or information.

Execute the file if it is a program (cause the program to be run).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Data Center?

A

A Data Center is a centralized facility used for the acquisition, storage, processing, analysis, management, and dissemination of data pertaining to a particular business. Data Centers generally house computer systems and associated components such as telecommunications and storage systems. The primary purpose of the Data Center is to run the applications that handle the core business and operational data of the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the steps that are typically taken to manage the physical environment of the Data Center?

A

The physical environment of a Data Center is rigorously controlled. Facilities typically include air conditioning systems, fire prevention and suppression equipment and systems, uninterruptible power supplies, backup generators, and other equipment intended to protect and maintain a controlled environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is it important to have such strict controls over our Data Centers?

A

While there may be an obvious need for protection against intruders and the intentional harm that they might cause, potential hazards from those working in and around our facilities can pose a similar (and perhaps greater) risk to our business operations and information security. Even the simple mistakes of well-intentioned staff members can pose a significant threat to operations. As a result, every retail company must carefully evaluate their specific security needs and determine the most appropriate and cost-effective measures to restrict access and protect their facilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The design of the security system for our data centers should include what basic considerations?

A

Cost of equipment - Budget considerations often limit extensive use of high-confidence identification methods and equipment. The typical approach is to utilize a variety of techniques that are appropriate to the various needs, functionality, and security levels.

Combining technologies - The reliability of our identification methods at any level can be heightened by combining lower cost technologies with the innermost (highest security) levels enjoying the combined protection of all the outer perimeters that contain it.

User acceptance - Ease of use and reliability of identification are important for preventing the system from becoming a source of frustration and a temptation for subversion.

Scalability – Can the design of our system be easily modified to achieve increased functional demands when necessity, funding and confidence in the technology increase?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Defense in Depth?

A

Defense in Depth is the coordinated use and strategic layering of multiple security countermeasures in our protection plans. A strategy commonly used as part of both physical and cyber-security plans, the idea is based on the principle that it is more difficult for unauthorized individuals to defeat a complex and multi-layered defense than to penetrate a single barrier. While each of these layers on their own might serve as a capable deterrent to unauthorized access, the mitigation of highly technical and complex threats requires the use of a combination of methods as part of a well-designed strategy amplifies our security efforts, creating a much stronger, more formidable system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some of the tools commonly used to help protect our Data Centers?

A

i) Access Tools

Are commonly used to control entrance and exit into sensitive security areas.

Cards and Tokens are frequently used to manage access control. This type of technology will vary in sophistication based on the ability of the device to be reprogrammed, resistance to counterfeiting, convenience and physical format, reader costs, and a variety of other factors. Regardless of how reliable these devices may be, the security provided remains limited, as there is no guarantee the correct individual is using them. Often this method is combined with other security measures (Passwords, for example).

Keypads and Coded Locks are widely used as a method of access control. They are very reliable and user-friendly, however security can be limited by the sharable and guessable nature of passwords. “Keypad” generally implies that the system has the ability to accept multiple codes, while “Coded Lock” generally refers to a device having only one code that everyone uses. The security level of these devices can be increased by periodically changing codes, which requires a system for informing users and disseminating new codes.

Biometric Security Technologies. Biometrics are a means for uniquely recognizing people based upon one or more intrinsic physical or behavioral traits. Physical biometrics include fingerprint identification, face recognition, iris recognition, and hand geometry. Behavioral-based biometrics might include signatures and handwriting analysis, and voice recognition, for example. Biometric technology is rapidly developing, becoming more reliable, and less expensive. More affordable options (especially fingerprint recognition) are entering the mainstream of security solutions. Biometric identification is typically not used to recognize identity by searching a database for a match, but rather to corroborate an identity first established by a different method of identification (For example, in concert with a pass code). As costs and performance improve, it may become more common as a stand-alone security device.

ii) Camera Systems

Camera Systems are still widely used as part of our physical access control systems. CCTV systems—both covert and overt—can provide interior and exterior monitoring, serve as an effective deterrent, and provide opportunity for post-incident review. Several types of systems are available depending on purpose and budgets, and can be operated on-site or from remote locations across the Internet.

iii) Security Guards

Security Guards provide the surveillance capability based on the utilization of human senses as well as the ability to respond with mobility and intelligence to suspicious, unusual, or other critical events. Despite the many technological advances in the field of physical security, experts agree that a quality staff of protection professionals remains a premium method for supporting access control efforts.

iv) Sensors & Alarms

Sensors and Alarms, whether motion sensors, contact alarms, heat sensors, laser beam barriers or other forms of sensors and alarms. Some may utilize silent alarm mechanisms, while others use audible alarm devices.

v) Visitor Control

Visitor Control is an important consideration in any security system design. This may consist of a registration/sign-in process and issuance of temporary badges or cards for low security areas, or may require more strict access requirements and designated escorts for high security areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Why should an active document retention and destruction policy be considered a priority for any business?

A

With the changing complexities of document management (which must address both hardcopy materials and electronic data), what organizations keep and what they destroy must be a well thought out process that is appropriately managed. The primary focus of managing this information is based on the need to secure financial and other confidential information against theft or unintended/unauthorized release. And while this is surely a critical component of document management, companies must also consider that the more routine, day-to-day documents created by employees at all levels can also prove to be just as critical to the success or failure of the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some important tips for developing and maintaining a Document Retention and Destruction program?

A

A good starting point is to define what constitutes a “business record” and a means to categorize specific records. Records are created for a variety of reasons, but whatever the reason, whenever a record is created there is a useful life of that record. Having a definition and a means of categorizing documents will make operational record keeping decisions easier and more efficient.

The company’s technology (IT) department should be involved in decisions regarding the policy and methods for enforcement when those policies involve electronic or other related venues and documents.

There should be a clear schedule identifying the minimum and maximum retention periods for all documents covered within the program.

Numerous statutes, regulations, and regulatory instruments impose record keeping requirements on retail organizations and other business entities, generally applicable to specific categories of records. Such requirements may involve what, where, how, and for how long these records must be maintained. All pertinent practices and requirements should be maintained and reviewed on a regular and consistent basis to ensure compliance.

There should be a framework for administration of the program to include training and education, assigning monitoring responsibilities, capability assessments, and a schedule for updating the program so that it reflects current legal requirements and business needs.

Appropriate security and privacy controls must be established to ensure the protection of sensitive/confidential documents. Every company is bound by contract, law, or practice to treat certain information as confidential, and every effort should be made to maintain that trust at all times. This would include security of the storage medium as well as the establishment of stringent procedures and protections when such documents are destroyed. Protection and control should be of paramount concern up to and including document destruction.

The program should be documented, published, and appropriately communicated to enhance understanding, limit confusion, and increase efficiencies.

Clear accountability should be established for enforcement of the program. Involved employees should be properly educated as to the importance of the policies and held accountable for following established guidelines. Routine (scheduled and unscheduled) audits should be conducted to ensure compliance.

There may be instances when the suspension of records destruction is necessary due to incidents such as imminent or current litigation, receipt of subpoenas, government inquiries, audits, or other types of related events that might warrant such action. When such records may be needed beyond the defined retention period, a methodology should be in place which immediately notifies all appropriate personnel of these actions, to include legal counsel, records managers, department managers, IT managers, and operations and loss prevention executives when necessary and appropriate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Caesar’s Cipher?

A

To communicate with his generals, Caesar used what is now known as Caesar’s cipher, a very simple encryption technique. This was a substitution cipher in which each letter of the text is replaced by a letter a certain fixed number of positions down the alphabet (for example, with a shift of 3, “a” would be replaced with “d”, “b” would be replaced with “e”, and so on). This method was believed to be very effective at the time, especially considering many of Caesar’s enemies would have been illiterate, and others would have assumed that the messages were written in an unknown foreign language.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are some of the primary business objectives that our information security programs should strive to accomplish?

A

Information Availability - Our systems should address the processes, policies, and controls used to ensure authorized users have prompt access to information. This serves to protect against intentional or accidental attempts to deny appropriate user access to information or systems that are necessary for the legitimate operations of the business.

Integrity of Data Systems - This relates to the processes, policies, and controls used to ensure information has not been altered without legitimate authorization, and that systems are free from unauthorized manipulation that could compromise accuracy, completeness, and reliability.

Data & System Confidentiality - This involves the processes, policies, and controls employed to protect both company and customer information against unauthorized access or use.

Accountability - This entails the processes, policies, and controls necessary to trace actions back to their source. Accountability directly supports legitimate access while deterring unauthorized intrusion, providing for better security monitoring, assisting recovery efforts, and enhancing the legal admissibility of data records.

Confidence - This addresses the processes, policies, and controls used to ensure technical and operational security measures work as intended. As part of the system design, this would support availability, integrity, confidentiality, and accountability, and highlights the notion that secure systems provide intended functions while preventing undesired actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What can cause security measures to lag behind advancements in technology?

A

Technology has opened the doors to vast informational resources, and retailers are responding aggressively to maintain a competitive edge. But in our push to get ahead in the highly competitive world of business, information technologies must reap immediate benefits. As a result, the technology can be significantly ahead of the controls. Security measures can lag behind.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Network security tasks can typically be broken down into what three basic categories?

A

Protection - Building and maintaining systems and networks to maximize both security and efficiency

Detection - Thoroughly and expeditiously identifying any and every compromise to systems and networks as they occur

Reaction - Responding to any and every incident and returning systems and networks to a safe and viable state as quickly as possible.

25
Q

What is a data breach?

A

A data breach is a security incident in which sensitive, protected, or confidential data has been copied, transmitted, viewed, stolen, or used by an individual unauthorized to do so. Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), Personally identifiable information (PII), trade secrets of corporations, intellectual property, or other confidential information.

26
Q

Why is social media considered a primary point of vulnerability to our Network Security efforts?

A

Ninety percent or more of the malware is getting in through social media. By using web-based and mobile technologies to turn communication into interactive dialogue, social media creates an effective channel for individuals and groups of people to connect, interact, create, and share.

With businesses constantly positioning to make news, build their brands, improve communications, and grow their customer base, companies are using email blasts and a plethora of platforms to include Facebook, Twitter, LinkedIn and YouTube to market products and services. These powerful communication tools can have significant influence on awareness, acceptance, and behavior. They play an important role in many marketing strategies, and are also a common vehicle used by many of our employees to network and communicate with one another. Unfortunately, these same resources are opening doors to many data security issues. This underscores the need to educate our teams on the types and sources of network threats, and some of the fundamental steps that can be taken to avoid intrusion.

27
Q

What is a Denial of Service attack? How can they impact a retail operation?

A

A denial of service (DoS) attack is an incident in which a user or organization is deprived of some or all network connectivity or services (for example, email services). Denial of Service attacks do not involve breaking into the target system, but rather flood a network with an overwhelming amount of traffic, causing target systems and networks to behave unpredictably, slowing response time for legitimate traffic—or grinding it to a halt completely and crashing the system. The fundamental objective of a DoS attack is to degrade the availability of service, whether for the actual system users or other systems that interact with the network.

The implications of a DoS attack can vary significantly. However, as retailers move deeper into the world of e-commerce, this can grow into a tremendous issue. The real place to hurt an e-business is to affect its Internet presence in some way, and DoS attacks can be an efficient means of achieving this end. The website is the engine that drives e-commerce, and customers are often won or lost on the basis of the site’s availability and speed. If a site becomes inaccessible or unresponsive, a competitor’s site is only a click away. As a result, companies reliant on Internet traffic and e-purchases are at particular risk from these attacks.

28
Q

What is a virus?

A

The term “Virus” has long been used to generally describe any computer threat, but actually refers to a specific type of malware that inserts malicious code into existing documents or programs. New viruses are discovered daily. Some exist simply to replicate themselves. Others can do serious damage such as erasing files or even rendering the computer itself inoperable. Today, viruses are still by far the most common type of network security threat.

29
Q

What is a worm?

A

A “Worm” is similar to a virus. It can do damage by sheer replication, consuming internal disk and memory resources within a single computer or by exhausting network bandwidth. While worms may replicate themselves like viruses, they do not alter files like viruses do. Worms reside in memory, and usually remain unnoticed until the rate of replication reduces system resources to the point that it becomes noticeable.

30
Q

What is spam?

A

Depending on the source cited, spam can comprise more than 80 percent of daily emails sent throughout the world, resulting in billions of dollars in lost productivity. “Spam” is unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups. Spam email takes a variety of forms, ranging from emails promoting various products, to malicious, coordinated attacks designed to take up so much bandwidth on a network so as to cause it to crash. A more recent trend is “image spam”, which eats up even more bandwidth than its textual cousin, and often circumvents traditional spam filters.

31
Q

What is an Unauthorized Access attack?

A

The goal of these attacks is to access some resource that your network should not provide the attacker. This may ultimately involve executing system commands illicitly and making configuration changes to the system, manipulating/changing data, data destruction, and data theft.

32
Q

What is a Trojan Horse?

A

A “Trojan Horse”, or simply “Trojan” is a program that installs malicious software while under the guise of doing something else. Unlike a computer virus, a Trojan Horse does not spread by inserting its code into other computer files, but rather installs programs which allow unauthorized remote access to a system by unwanted parties, typically with malicious intentions. Similar to the mythical Trojan Horse of Greek legend, it is hidden in a computer program or other computer file which may appear to be useful, interesting, or at the very least harmless. When the computer program or file is executed by the unsuspecting user, the malicious code is also executed resulting in the set up or installation of the harmful program. It can be used to record every keystroke by a system’s user, thus stealing financial account information, social security numbers, passwords, and other sensitive and confidential information.

Trojan horse programs cannot operate autonomously, and depend on actions by the intended victims. As such, if Trojans replicate and distribute themselves, each new victim must run the Trojan. These programs do not replicate themselves like a virus, but they can be propagated as attachments to a virus. Trojans can be particularly dangerous because they can appear harmless on the surface.

33
Q

What is Phishing?

A

“Phishing” is a method of using deceptive e-mails and websites designed to trick the recipient into clicking on a link to an insecure website and revealing credit card, passwords, social security numbers and other sensitive and confidential information to those who intend to use them for fraudulent purposes. Typically, an e-mail is sent disguised as a legitimate business request. The e-mail is often forged so that it appears to come from a reputable source used for legitimate company business, and it usually includes a link to a website that looks exactly like an authentic website. The e-mails often instruct the recipient to verify or update account information by requesting a reply to the e-mail with updated information, or by providing the recipient with a link to a website where you will be asked to re-enter account details. However, the site is false, and when the victim types in passwords or other sensitive information, that data is captured by the phisher. This information may then be used to commit various forms of fraud and identity theft.

Phishing in all its varieties is a huge and growing problem for all types of businesses. As we all become more interconnected and continue to access more information through networks, there will be more opportunities for phishers to compromise our networks. A single phishing incident can compromise an entire network’s security if an employee is tricked into giving his network account information.

34
Q

What is a Packet Sniffer?

A

A “Packet Sniffer” is computer software or hardware that has the capability of capturing data streams over a digital network. As data streams travel back and forth over the network, the “sniffer” captures information packets, decoding and analyzing its content. The result is the exposure of passwords, user names, credit card numbers, trade secrets, and other sensitive and confidential information as well as the loss of critical data and account information. Packet sniffers work by monitoring and recording all the information that comes from and goes to exposed computers over a compromised network. A single victim of packet sniffing has the potential to compromise sensitive information throughout an entire network.

35
Q

As more and different types of information has migrated to electronic formats, how has this impacted our data security programs?

A

as more and different types of information have migrated to electronic formats there has been a significant increase in the number of users, access methods, available data streams, and the underlying technology that brings it all together. Businesses continue to demand new ways to use information, and many uses are still evolving. And as these resources continue to grow in importance and purpose, the stakes associated with protecting these resources have continued to rise as well.

Traditionally our focus and attention has been directed towards external sources and perimeter-based security solutions. However, it is becoming more and more prevalent that our greatest potential threats may be coming from inside our firewalls. Many of today’s threats are introduced from inside the network. With such threats becoming increasingly common, companies are realizing that they must provide strong defenses within their internal network as well.

36
Q

What are some of the primary internal information security threats that we deal with in retail loss prevention?

A

The primary internal information security threats include the leaking of confidential information, the distortion of sensitive information, hardware theft, fraud, data loss, information system failures, sabotage, and other related risks. Due to resource constraints, organizations cannot implement unlimited controls to protect their systems. Rather, we must come to better understand the major threats and implement effective controls accordingly. A holistic security solution should protect databases from potential threats whenever and wherever that information might be available, and a company policy for data protection and compliance should be practiced and enforced across all platforms.

37
Q

What are some common practices that can help enhance our internal security efforts?

A

Establishing strong physical security for the entire infrastructure. Change locks and passcodes when employees leave. Change passwords to any shared accounts. Erase hard drives, flash drives, and similar tools when taken out of service. Use a paper shredder. Simple steps can also be the most important.

Network security should be built into the hiring process. Practice due diligence and proper background checks—particularly for employees that will be involved in any level of IT. Establish an “Acceptable Use” policy and integrate it into the employment process.

Explicitly forbid bypassing security checkpoints (firewalls, etc.) as part of your Acceptable Use policy. Establish desktop management policies to include virus protection. Virus protection is a mandatory component of desktop management and should be second nature to all employees that spend any part of their workday on a computer.

Install programs that check and monitor network traffic, and employ intrusion detection systems. Audit systems and procedures periodically.

Maintain up-to-date operating systems and applications. Keeping software current is a basic component of any data security program.

Restrict content. One of the greatest risks to the organization is unauthorized disclosure of content.

Manage and enforce guidelines regarding peer-to-peer file sharing. Unauthorized software can be a primary path for information leaks.

Develop and enforce policies regarding USB devices. Flash drives and similar devices are extremely compact and can hold a significant amount of information. Access to critical systems can cause tremendous vulnerabilities without effective controls.

38
Q

Security in a wireless network must address two separate but related and complimentary issues. What are they?

A

we must protect the network and its resources from unauthorized access, and we must protect data as it travels over the air between the user and the network.

39
Q

In the wireless world where network traffic travels through the airwaves what are some of the primary concerns that exist due to the potential for intercepting the traffic stream?

A

Unauthorized access to a company’s computer network may be accomplished through wireless connections, bypassing any firewall protections.

Sensitive information that is not encrypted (or is poorly encrypted) and is transmitted between wireless devices may be intercepted and disclosed.

Denial of Service attacks may be intensified.

The identities of legitimate users may be stolen, with malicious parties masquerading as those users to gain access to corporate networks.

Malicious parties may be able to track the movements of legitimate users, deploying unauthorized devices and other means to surreptitiously gain access and steal sensitive information.

Intruders may be able to gain connectivity to network management controls and disable or disrupt operations.

40
Q

What are some of the key principles that can help us protect our information and information systems?

A

Know what you have. What types of information do we have available in our files and on our systems? Different types of information have different types of risks. We should have a full understanding of all the different types of sensitive and confidential information that we maintain as a business so that we can assess and prioritize our needs.

Know how and where it’s stored. A complete inventory should be maintained that identifies where and how all sensitive company information is stored. This not only involves resources directly associated with our data centers and websites, but all pertinent resources up to and including all computers, laptops, flash drives, cell phones, home computers, and any and all other relevant equipment. This inventory should be continuously updated and revised accordingly as resources are added, removed, change locations, or change hands.

Know how it flows. We can only determine the best methods to secure information once we’ve established where it’s coming from, and where it’s going to as part of our business operations. Understand how information moves into, through, and out of the company.

Know who has access to it. Identifying who has—or could have—access to our information is essential to assessing security vulnerabilities. Effective access controls and user authorization practices is critical to any successful program.

Keep only what is needed for the business. If there isn’t a legitimate business need for sensitive information—particularly personally identifying information such as social security numbers, personal accounts, etc.—don’t keep it. If there is a legitimate business need for that information, use it only for required and lawful purposes, and retain it only as long as necessary. Develop a written Records Retention Policy that clearly identifies what information must be kept, how to secure it, how long to keep it, and how to properly and securely dispose of it once it is no longer needed.

Protect the information in your care. Once you’ve established what information is most vital, determine the best and most effective ways to protect that sensitive and confidential information, encompassing physical security measures, electronic/network security, administrative controls and employee training. A well-trained workforce is the best defense again information theft and data breaches.

Support through backup and recovery processes. Effective backup and recovery processes are intended to minimize the impact that potential information losses and related incidents have on the business.

Properly dispose of what is no longer needed. Information disposal practices that are reasonable and appropriate must be utilized to ensure information cannot be read, deciphered or reconstructed once it has been disposed of. Reasonable measures should be established based on the type and sensitivity of the information, the costs and benefits of different disposal methods, and the related changes in technology.

Create a plan to respond to potential incidents. Having a proactive plan in place can expedite recovery time, minimize the potential impact on the business, and enhance investigative efforts. Many states and federal regulatory agencies also have specific guidelines addressing certain data breaches that must be followed.

Invest in talent. Automated tools and policies can’t be our only defense against these attacks. There needs to be a dedicated focus on developing talent to help interpret all of the information that’s being produced, and how to respond to it. Too many organizations place too much emphasis on the tools, and not enough on the people. Invest in leadership and developing your team.

41
Q

When it comes to the security of sensitive and confidential information, what are some of the common objectives and requirements?

A

Protecting sensitive data when necessary and appropriate through strong encryption and encryption management.

Segregating duties between database administrators and security administrators. Management of security policy should be separated from database functions to provide a “checks and balances” approach to the process.

Reporting and monitoring security policies and access to sensitive and confidential information through detailed audit trails. Such processes should document who has accessed data (or who attempted to access data), what specific database was accessed, what action was performed, and when it occurred.

Controlling access to sensitive information by assigning unique access IDs and access privileges, and defining user access rights based on the organization’s specific security policies.

42
Q

What are some of the more common practices, systems and software that can increase the security of our information networks?

A

Strong Firewall Protections at all Network Transit Points. A firewall provides a controlled barrier that has the ability to block network traffic into and out of certain destinations, and can tightly control what is allowed to move from one side to the other. Firewalls can range from being fairly simple to very complex.

Strong Antivirus Software and other Internet Security Software. Antivirus software attempts to identify, neutralize, or eliminate malicious insults by looking for irregularities in a computer system and then comparing its findings to a database of virus information. Note: It is important to update virus definitions regularly and upgrade software periodically to protect against newly created viruses.

Strong Authentication, Username and Password Management Practices. Authentication is the process of determining user identity, commonly achieved through the use of passwords. Authentication is used to determine the identity of the user as well as manage what they are authorized to access. Poor username and password management is a typical problem in many company networks. Following basic practices can significantly improve network management.

Securing Confidential and other Sensitive Network Data with Encryption. Encryption is the conversion of information into a form (known as ciphertext) that cannot be easily understood by unauthorized individuals (Decryption is the process of converting that information back into its original form so that it can be understood). Encryption of data is typically accomplished by combining plain text data with a secret “key” using a particular encryption algorithm. Unless the secret key is known, the information cannot be decrypted back into plain text so that it can be understood (refer to our Caesar’s Cypher example).

Strong Physical Security Measures for Company Facilities. As previously discussed within this chapter.

Network Audits. The institution of frequent network audits and other appropriate checks and balances that can further increase the overall protection of the network.

Network Monitoring and Analysis. Proactive measures instituted to scan for new hosts and out-of-date systems, as well as monitoring for suspicious activity throughout the network. This should also involve updating systems and protocols when necessary and appropriate to maintain network security.

Effective Incident Response Mechanisms. Policies and guidelines should be developed, accessible, understood, and when necessary appropriately executed to allow for quick and effective response to any incidents that should occur to minimize damage and related impact of the potential compromise; and reduce business disruption.

43
Q

What should be the principle focus of an effective Backup and Recovery plan?

A

our principal focus should be on protecting what matters the most. While all data is valuable to the company, the reality remains that practical, financial, and technological constraints do not allow for every piece of data on every desktop, notebook, or server to always be backed up and available for immediate restoration. For this reason, we should first and foremost protect the data that is necessary to perform mission-critical functions within the organization—data that supports key business operations and will potentially have the greatest impact on the company.

Effective backup and recovery programs and processes should be established that serve to protect all of our critical data. It can be just as important during the recovery phase to have a process in place to identify which areas are most critical to the operation of the business and should be restored first. The loss of critical data is among the highest security vulnerabilities facing businesses today, and it is crucial that viable data protection strategies and effective backup and recovery processes are in place.

44
Q

What are some key considerations of the Backup and Recovery process?

A

Assigning Responsibility - Determining who will be responsible for backup tasks, and whether they have the necessary skills to carry out this function. Some processes can be fairly simple (backing up files on desktop or laptop computers, for example) while others may be much more complicated (for example, protecting the information bank at our data centers). Plans should further identify who will be assigned this responsibility should the primary individuals be absent or unavailable.

Data Capture - Ensuring that all files and information are captured reliably and accurately, and that the quality of the data capturing process is verified on a regular and consistent basis. Is the software configured properly? Is all related equipment well maintained? Are involved employees reliable and properly trained? Is data being captured often enough to meet our business and operational needs?

Removal and Storage – Backup data that is left on-site may be exposed to the same physical and security risks as the original data. What is our medium for storing backup materials? All backups should be properly handled and stored, to include labeling, placement, and protection from sun exposure, magnetic fields, liquids, and any and all other exposures that may damage the media. If data is removed electronically, sufficient encryption and security protocols must be maintained. The storage location should be protected from intrusion and environmental damage. Additionally, backup data should be stored in a place that is quickly and easily accessible so as to enhance efficiencies.

Recovery - How long would it take to recover a lost file? The cost of downtime can be substantial—the longer it takes to restore the data, the more the company stands to lose as a result. Ensure that data can be recovered within the timeframe that is necessary to meet our business needs.

45
Q

What are some of the common objectives of our data protection audits?

A

Procedures and responsibilities for all key personnel, to include familiarity with company policies and practices, training and awareness initiatives, change management processes, sign-off on new applications, etc.

All policies and procedures should be readily known and physically available to all key personnel. Important documented procedures should include: job responsibilities, back up policies, security policies, employee termination policies, system operating procedures and an overview of operating systems.

Appropriate back-up procedures are in place—and understood—to prevent loss of important data, expedite system recovery and minimize downtime in the event of system failure or compromise. Properly trained and adequately skilled personnel are readily available in the event of any potential threat, failure or compromise.

The data center and other key facilities have adequate physical security controls to prevent unauthorized access. This would include guard functions, locked/secure area, entrance security, equipment security (bolted down, etc.), computer monitoring systems and other critical security controls.

Adequate environmental controls are in place to ensure equipment is protected from overheating, fire, water damage and other potential issues. This would include but not limited to: air conditioning units, raised floors, humidifiers, uninterruptible power supplies, etc.

Accessibility (key cards, login ID’s, secure passwords, etc.), authentication, and authorization controls are followed. Access rights are appropriate to assigned users and properly controlled. Duties are appropriately segregated. Vendor service personnel are supervised when doing work on data center equipment.

All equipment is working properly and effectively. Employees are adequately educated about equipment and properly perform their jobs. Equipment utilization reports, equipment inspection for damage and functionality, system downtime records and equipment performance measurements all help to determine the state of this equipment. Employee interviews should be conducted to determine if preventative maintenance policies are in place and performed on schedule.

Network controls and potential vulnerabilities are inspected to ensure compliance. Virus definitions are up-to-date, software and other upgrades are installed with adequate attention to default configurations, etc.

46
Q

What are the key components of a data privacy program?

A

Data privacy involves the relationship between the collection and dissemination of information, the public’s expectation of privacy, and the legal issues that surround the subject. Privacy concerns can arise from a wide range of sources, and exist whenever and wherever Personally Identifiable Information is gathered and stored. With today’s technological advances, the capability to collect personal information about individuals can be gathered and combined from a wide variety of sources. While there are currently no all-encompassing laws regulating the use of personal information, as information systems are interconnected and information is shared every retail organization has an intrinsic responsibility to demonstrate care and prudence in the handling of personal information at all times, and conduct its business in ways that exhibit respect for personal privacy.

47
Q

What is HIPAA?

A

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) was enacted by Congress to create a national standard for the protection of employee health care (specifically the protection of health insurance coverage for workers and their families when they change or lose jobs), the development and implementation of national standards for healthcare transactions, and protection of the integrity, confidentiality, and availability of personal health information.

48
Q

Why were HIPAA standards established?

A

These standards were established to improve the efficiency and effectiveness of the nation’s health care system while protecting the rights and privacy of citizens in regards to health-related issues and services.

HIPAA statutes establish regulations for the use and disclosure of protected health information, which is any information related to health status, health care provisions, or payment for health care that is associated with an individual. HIPAA is intended to assure that an individual’s health information is properly protected, while also allowing for the flow of health information needed to provide and promote high quality health care and to protect the public’s health and well-being. The goal is to strike a balance that permits important uses of health information, while protecting the privacy of people who seek care and healing.

49
Q

When was the first bank issued charge card introduced? What was the name of the card?

A

The first bank card, “Charg-It,” was introduced by John Biggins, a Brooklyn banker, in 1946.

50
Q

What five programs created the primary foundation for security standards for how to process, store and transmit cardholder information?

A

American Express (Data Security Operating Policy, or DSOP); Discover (Discover Information Security and Compliance, or DISC); MasterCard (MasterCard Site Data Protection, or SDP); JCB International (Data Security Program); and Visa (Cardholder Information Security Program, or CISP)

51
Q

What is the Payment Card Industry Data Security Standard?

A

As a result, the Payment Card Industry Security Standards Council (PCI SSC) was established in December of 2004. A global forum designed to oversee the development of a single, comprehensive data security program, the mission of the PCI Security Standards Council is to enhance payment account security by driving education and awareness programs and standards that increase payment data security for the industry as a whole. The council then established the Payment Card Industry Data Security Standard (PCI DSS), allowing service providers and merchants the ability to abide by one common credit card data security program that all providers accept and agree upon. The Council further provides ongoing development, enhancement, storage, dissemination and implementation of security standards for credit card data protection.

The PCI program enforces a yearly assessment process of merchant policies, procedures, and IT systems involved in or supporting the processing, storage, or transmission of credit card data. Depending on the number of credit card transactions that are processed on a yearly basis by the company, the Council designates service provider/merchants into specific categories (Level 1,2,3 or 4). Once assigned a designation, there are certain testing requirements that must be met on an annual basis at each level, reviewing internal security controls and processes for data security compliance. This will include an annual assessment of the company’s information security policies, procedures and technical Information Technology (IT) controls pertaining to the credit card processing environment.

52
Q

What are the specific PCI DSS standards?

A

Build and Maintain a Secure Network. A firewall configuration must be installed and maintained that is designed to protect cardholder information. Vendor-supplied defaults for system passwords and other security parameters cannot be used.

Protect Cardholder Data. Stored cardholder data must be protected. Any transmissions of cardholder data across open, public networks must be encrypted.

Maintain a Vulnerability Management Program. Anti-virus software must be utilized and regularly updated. Secure systems and applications must be developed and maintained.

Implement Strong Access Control Measures. Access to cardholder data must be restricted to a business need-to-know basis. Each person with computer access must be assigned a unique ID. Physical access to cardholder data must be restricted.

Regularly Monitor and Test Networks. All access to network resources and cardholder data must be tracked and monitored. Security systems and processes must be regularly tested.

Maintain an Information Security Policy. Such a policy must address the different aspects of information security.

53
Q

Due to the need to safeguard the privacy of our employees, what are some of the standards that every company should follow?

A

While there are employees who have a legitimate need to view the information in a personnel file (For example, a supervisor may need to review performance evaluations to decide whether to promote an employee), companies must establish procedures that will assure that confidential information is available only to those persons whose work requires access to such information.

The information in an employee personnel file is not to be released to anyone other than users whose duties require access. Employees with access to confidential employee data should sign a confidentiality agreement acknowledging that the employee understands requirements for protecting confidential employee data.

Reasonable precautions must be taken to prevent unauthorized persons from casually observing confidential information. Information should be maintained in locked files and/or secure databases unless being used for authorized purposes.

Confidential employee information should not be shared outside of the company unless it is for legitimate company/employee purposes. The only exceptions are by written permission of the employee whose information is being requested, or pursuant to a valid subpoena or other legal order. Recipients must be informed that the information provided is confidential and is provided for the sole purpose of the specific business need. Also, recipients must be informed that they are responsible for the protection of the information and the destruction of all files after the intended use is satisfied.

In most states, employees have the right to examine the contents of their own personnel files. This allows individuals the opportunity to confirm information in the file and identify any specific information which is believed to be incorrect. Procedures should be established that enable the employee to correct inaccurate information discovered in the files, as well as remove or otherwise explain certain content contained in these records with which the employee disagrees. The objective should be to ensure the accuracy of information regarding each individual.

Certain kinds of information should not be maintained in an employee’s personnel records. An employer should not keep records of an employee’s activities or associations that do not directly relate to an employee’s performance and job qualifications. This would include but is not limited to political activities and communications, religious and civic affiliations, and the like. Some jurisdictions further protect against identifying marital status, living arrangements, arrest records, or other personal characteristics.

Medical records should be maintained separately from an employee’s personnel file. If an employee has a disability or other specific medical condition the Americans with Disabilities Act requires that those records be kept confidential and maintained in a separate file with access restricted to a limited number of people.

Form I-9 should not be maintained in an employees’ personnel file (Form I-9 is a form from U.S. Citizenship and Immigration Services (USCIS), formerly the INS). While form I-9 must be completed for all employees verifying that they are legally authorized to work in the United States, these documents should be maintained in a separate file.

An employee’s personnel file should not contain records of the employee that relate to the investigation of a possible criminal offense, letters of reference, documents which are being developed or prepared for use in civil, criminal, or grievance procedures; materials which are used by the employer to plan for future operations, or information available to the employee under the Fair Credit Reporting Act.

54
Q

A cyber-criminal attempts to gain access to our systems by using computer software that has the capability of capturing data streams over a digital network, potentially exposing sensitive and confidential information as well as risking the loss of critical data and account information. This type of malware is known as a:

A

a. Packet Sniffer

55
Q

Commonly residing in computer memory, this type of computer malware can do damage by sheer replication without user action, consuming internal disk and memory resources within a single computer or by exhausting network bandwidth, but does not actually alter files:

A

b. Worm

56
Q

In an attempt to disrupt company business, a disgruntled former employee sends an email disguised as a “joke” to several of his former coworkers with a photo attachment as part of the file. However, the employee has embedded a virus into the photo file that spreads throughout the company computer systems as the email is passed on, causing significant damage to the network connectivity. This would be an example of what type of network threat?

A

b. Denial of Service Attack

57
Q

This is the process of using system components to track and document what the user did and where they visited while using a computer operating system:

A

d. Accountability

58
Q

The ability to read information found in the file contents of a computer system, write or modify the contents of a file, or execute the file if it is a program are all examples of what type of access control process?

A

a. Authorization

59
Q

The goal of this type of network threat is to access some resource that your network should not provide the attacker, such as a data breach. This may ultimately involve executing system commands illicitly and making configuration changes to the system, manipulating/changing data, data destruction, and data theft:

A

d. Unauthorized Access Attack